Archive for August, 2011

August 28, 2011 – Episode 227

Posted in Breach, Court Cases, criminal forensics, darkweb, ediscovery, Show Notes, The CyberJungle, Vulnerabilities, web server security with tags , , , , on August 28, 2011 by datasecurityblog

Episode 227 of  The CyberJungle is about 25 minutes long.  You can hear it by clicking on the flash player below. The interview begins at about ~16min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 227 via the flash player:

Interview

Attorney Benjamin Wright is the author of technology law books, including The Law of Electronic Commerce (Aspen Publishers) and Business Law and Computer Security (SANS). A featured speaker at industry conferences and professional meetings. He is looking for help with a new study.

Our Take On This Week’s News

Taking down a business competitor via cyber attack? Read Elinor Mills’ story.

Understanding the simplicity of the RSASecureID attack. Read the F-Secure posting.

Tales From The Dark Web

Confidential voter data under attack in Maine.

Wrap

Why that $99 HPweOS tablet could be a business security risk. Read the Marc Maiffret, CTO of E-Eye Digital posting

August 22, 2011 – Episode 226

Posted in Breach, Conference Coverage, Court Cases, darkweb, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , on August 21, 2011 by datasecurityblog

Episode 226 of  The CyberJungle is about 27 minutes long this week.  You can hear it by clicking on the flash player below. The interview begins at about 18min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 226 via the flash player:

Interview

Hotel VoIP system open to serious attack? Interview with Jason Ostrum of ViperLab.net . Get the latest open source VoIP Hooper tool. According to the site, “VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop security test. VoIP Hopper is a VoIP infrastructure security testing tool but also a tool that can be used to test the (in)security of VLANs”

Our Take On This Week’s News

Smartphone monitoring or malware: it’s all in the intent. Read the TrendMicro blog on the topic.

Can schools control private teacher/student digital conversations?

Microsoft has committed itself to encouraging young women to enter tech, as part of that effort, they host an event called Digigirlz, around the world.

Tales From The Dark Web

New wave of malware targets the desktops of web site publishers.

Wrap

The 20th anniversary of Linux Open Source Software. Here is the video mentioned in the segment

August 15, 2011 – Episode 225

Posted in Breach, Conference Coverage, criminal forensics, darkweb, ediscovery, Legislation, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , on August 14, 2011 by datasecurityblog

Episode 225 of  The CyberJungle is about 32 minutes long.  You can hear it by clicking on the flash player below. The interview begins at about 23min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 225 via the flash player:

Interviews

Cracking iPhone/iPad encryption;  Andrey Belenko the developer of a new iOS encryption cracking tool by ElcomSoft

Our Take On This Week’s News

A Bay Area Rapid Transit (Bart) Site Attacked by Anonymous,  thousands of rider email addresses and passwords exposed.

Unmanned areal vehicle boom? Two takes:

Open source edition: The Quadshot is a new kind of remote-control aircraft. It melds advanced open-source hardware, software and a unique airframe to provide the best parts of flying quadrocopters and airplanes. I saw the Quadshot while in the hallways of DefCon19. The creators claim it can be equipped with surveillance cameras. The next frontier in digital forensics? Quadshot is a Kickstart project, and the creators are looking to raise $25,000. Donors get the device once the funds are raised. See the link to the Kickstarter project, and all the details on the FlyQuadShot site. Download a conversation with Peter, one of the creators of Quadshot, recorded at DefCon19.

To listen to the interview with Peter, one of the creators of Quadshot, via the flash player:

Closed source edition:  Lockheed’s Maple Seed “Drone”

Read More: Will Drones Save Privacy Law? by of ConcurringOpinions.com

Tales From The Dark Web

Anonymous creating more sophisticated DoS tools: New hacking tools being developed to attack websites

Wrap

Apple Releases Full Page Welcome to IBM 30 Years Ago Yesterday

Las Vegas Hotel Point of Sale System Repeatedly “Hacked?” Read Samantha Stone’s DefCon story in the Las Vegas Review Journal

August 1, 2011 – Episode 224

Posted in Breach, Conference Coverage, Court Cases, criminal forensics, darkweb, ediscovery, Legislation, Report Security Flaws, Show Notes, The CyberJungle, Vulnerabilities with tags , , , , , , on August 1, 2011 by datasecurityblog

Episode 224 of  The CyberJungle is about 40 minutes long this week, due to extended preview coverage of BlackHat, SecurityBSides, and DefCon.  You can hear it by clicking on the flash player below. The first interview begins at about 17min, and the second interview at about 27min. You may download the file directly – great for listening on many smartphones. Or, you may go to the listening options page and browse for other ways to hear the show.

To listen to Episode 224 via the flash player:

Interviews

Brian Kennish, Founder of Anti-Web tracking tool maker Disconnect, on tracking the web trackers

Tyler Shields of Vericode, Owning your MobilePhone at every layer

Our Take On This Week’s News

The GMail Man – watch the Office365 Official Video

US Appeals Court: Ok to Check DNS of Those Arrested, from the Pittsburgh Post-Gazette


Tales From The Dark Web

Three-fourths of all rootkits on decade-old OS, says antivirus firm. Hat tip: Computerworld story by Gregg Keizer

Conference Coverage

The CyberJungle goes to BlackHat, SecurityBSides and DefCon this week. Get the reports in Conference Notes. Send your questions for Tyler Shields of Vericode via The CyberJungle Contact Form.

Follow

Get every new post delivered to your Inbox.

Join 1,141 other followers